CFP last date
20 May 2024
Reseach Article

Enhancing Software Secureness in Public ICT Applications

by C. K. Raju, P. B. S. Bhadoria
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 37 - Number 11
Year of Publication: 2012
Authors: C. K. Raju, P. B. S. Bhadoria
10.5120/4730-6920

C. K. Raju, P. B. S. Bhadoria . Enhancing Software Secureness in Public ICT Applications. International Journal of Computer Applications. 37, 11 ( January 2012), 23-29. DOI=10.5120/4730-6920

@article{ 10.5120/4730-6920,
author = { C. K. Raju, P. B. S. Bhadoria },
title = { Enhancing Software Secureness in Public ICT Applications },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 37 },
number = { 11 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 23-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume37/number11/4730-6920/ },
doi = { 10.5120/4730-6920 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:24:04.031712+05:30
%A C. K. Raju
%A P. B. S. Bhadoria
%T Enhancing Software Secureness in Public ICT Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 37
%N 11
%P 23-29
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Issues related to security and privacy of information under processing have been topics of great public interest. A perception of existence of an insecure channel of communication is usually created, which needed attention by experts. Most discussions also assume, among other issues, neutrality of the operating environment under which the principles of security or control for privacy are applied. Additionally, a standard image of a sender and receiver is posited to convey neutrality of the human agency involved in trans-reception of secure information. This article purports to view contradictions in the theme of security, when neutrality of software environment is contested or when the interests of human agency involved in trans-reception of information are in conflict. A shift of this nature is necessary because a proprietary software environment may be completely transparent to its developer community, even while remaining opaque or insecure to its user community.

References
  1. Boehm, B., Brown, J., Lipow, M.: 1976. Quantitative evaluation of software quality. Proceedings of the 2nd International Conference on Software Engineering, IEEE Computer Society pp. 592 605
  2. Capra, E., Francalanci, C., Merlo, F.: 2008. An empirical study on the relationship between software de- sign quality, development e ort and governance in open source projects. IEEE Transactions on Software Engineering 34(6), pp. 765 782
  3. Cowan, C.: 2003. Software security for open-source systems. Security Privacy, IEEE 1(1), pp. 38 45
  4. Dromey, R.G.: 1995. A model for software product quality. IEEE Transactions on Software Engineering 21, pp. 146 162
  5. Government of India: 2005. The National Rural Employment Guarantee Act NREGA 2005. Government Gazette (India)
  6. Government of India: 2008. Government Notification on Transparency in NREGA. Government Gazette (India) p. 9
  7. IEEE Guide for Software Quality Assurance Planning. 1986. ANSI/IEEE Std 983-1986 pp. 1 31
  8. IEEE standard for Software Quality Assurance Plans. 1989. IEEE Std 730.1-1989 pp. 0 1
  9. Jones, C.: 1994. Software Metrics: Good, Bad and Missing. Computer, IEEE 27(9), 98 100, ISSN:0018-9162
  10. Joshua Gay, editor. 2002. Free Software, Free Society: Selected Essays of Richard M. Stallman. pub-GNU-PRESS,
  11. Julia Allen, Sean Barnum, Robert Ellison, Gary McGraw, and Nancy Mead.: 2008. Software engineering: a guide for project managers Software security. Addison-Wesley Professional, First edition
  12. Khoshgoftaar, T.M., Liu, Y., Seliya, N.: 2004. A multiobjective module-order model for software quality enhancement. IEEE Transactions on Evolutionary Computation 8(6), pp. 593 608
  13. Li, X., Tiwari, M., Hardekopf, B., Sherwood, T., Chong, F.T.: 2010. Secure information flow analysis for hardware design: using the right abstraction for the job. In NY, USA, ACM.
  14. Madhuri, S., Mishra, D.: 2008. Strengthening National Rural Employment Guarantee Scheme (NREGS) through E-Governance. In: E-Governance in Practice
  15. McGraw, G.: 2004. Software Security. Security Privacy, IEEE 2(2), pp. 80 83 ISSN 1540-7993
  16. NIC, Government of India: 2007. User manual of NREGA. MIS for National Rural Employment Guarantee Act (NREGA) 2005
  17. Planning Commission, Government of India: 2003. India's Five Year Plans : Complete Documents: First Five Year Plan (1951-56) to Tenth Five Year Plan 2002-2007. Academic Foundation
  18. Rajalekshmi and K. Gopakumar.: 2007. E-governance services through telecenters: The role of human intermediary and issues of trust. Inf. Technol. Int. Dev. Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS '10, pages 8:1 8:7, New York, , 4(1): pp. 19 35
  19. Raju, C. K., and Bhadoria, P. B. S.: 2011. Software secureness for users: Significance in public ICT applications. In Ajith Abraham, Jaime Lloret Mauri, John F. Buford, Junichi Suzuki, and Sabu M. Thampi, editors, Advances in Computing and Communications , volume 193 of Communications in Computer and Information Science , pages 211 222. Springer Berlin Heidelberg.
  20. Raymond, E.S.: 2001. The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary. O'Reilly
  21. Software Quality Management System. Part 1: Requirements. Adopted from Standards Australia. 1993. IEEE Std 1298-1992; AS 3563.1-1991 pp. 0 1
  22. Tiemann, M.: An objective definition of open standards. Computer Standards and Interfaces, Science Direct 28(5), pp. 495 507 (2006), ISSN 0920-5489
  23. Villaneuva, E.: 2001. Use of Free Software in Public Agencies. Bill No 1609, Republic of Peru
Index Terms

Computer Science
Information Sciences

Keywords

Software Secureness Public ICT applications